fix extkeys_tests packages to be just extkeys
This commit is contained in:
parent
ae64d1d7d5
commit
8bca30f27b
|
@ -1,4 +1,4 @@
|
|||
package extkeys_test
|
||||
package extkeys
|
||||
|
||||
import (
|
||||
"bytes"
|
||||
|
@ -8,7 +8,6 @@ import (
|
|||
"testing"
|
||||
|
||||
"github.com/btcsuite/btcd/chaincfg"
|
||||
"github.com/status-im/status-go/extkeys"
|
||||
)
|
||||
|
||||
func TestBIP32Vectors(t *testing.T) {
|
||||
|
@ -30,35 +29,35 @@ func TestBIP32Vectors(t *testing.T) {
|
|||
{
|
||||
"test vector 1 chain m/0H",
|
||||
"000102030405060708090a0b0c0d0e0f",
|
||||
[]uint32{extkeys.HardenedKeyStart},
|
||||
[]uint32{HardenedKeyStart},
|
||||
"xpub68Gmy5EdvgibQVfPdqkBBCHxA5htiqg55crXYuXoQRKfDBFA1WEjWgP6LHhwBZeNK1VTsfTFUHCdrfp1bgwQ9xv5ski8PX9rL2dZXvgGDnw",
|
||||
"xprv9uHRZZhk6KAJC1avXpDAp4MDc3sQKNxDiPvvkX8Br5ngLNv1TxvUxt4cV1rGL5hj6KCesnDYUhd7oWgT11eZG7XnxHrnYeSvkzY7d2bhkJ7",
|
||||
},
|
||||
{
|
||||
"test vector 1 chain m/0H/1",
|
||||
"000102030405060708090a0b0c0d0e0f",
|
||||
[]uint32{extkeys.HardenedKeyStart, 1},
|
||||
[]uint32{HardenedKeyStart, 1},
|
||||
"xpub6ASuArnXKPbfEwhqN6e3mwBcDTgzisQN1wXN9BJcM47sSikHjJf3UFHKkNAWbWMiGj7Wf5uMash7SyYq527Hqck2AxYysAA7xmALppuCkwQ",
|
||||
"xprv9wTYmMFdV23N2TdNG573QoEsfRrWKQgWeibmLntzniatZvR9BmLnvSxqu53Kw1UmYPxLgboyZQaXwTCg8MSY3H2EU4pWcQDnRnrVA1xe8fs",
|
||||
},
|
||||
{
|
||||
"test vector 1 chain m/0H/1/2H",
|
||||
"000102030405060708090a0b0c0d0e0f",
|
||||
[]uint32{extkeys.HardenedKeyStart, 1, extkeys.HardenedKeyStart + 2},
|
||||
[]uint32{HardenedKeyStart, 1, HardenedKeyStart + 2},
|
||||
"xpub6D4BDPcP2GT577Vvch3R8wDkScZWzQzMMUm3PWbmWvVJrZwQY4VUNgqFJPMM3No2dFDFGTsxxpG5uJh7n7epu4trkrX7x7DogT5Uv6fcLW5",
|
||||
"xprv9z4pot5VBttmtdRTWfWQmoH1taj2axGVzFqSb8C9xaxKymcFzXBDptWmT7FwuEzG3ryjH4ktypQSAewRiNMjANTtpgP4mLTj34bhnZX7UiM",
|
||||
},
|
||||
{
|
||||
"test vector 1 chain m/0H/1/2H/2",
|
||||
"000102030405060708090a0b0c0d0e0f",
|
||||
[]uint32{extkeys.HardenedKeyStart, 1, extkeys.HardenedKeyStart + 2, 2},
|
||||
[]uint32{HardenedKeyStart, 1, HardenedKeyStart + 2, 2},
|
||||
"xpub6FHa3pjLCk84BayeJxFW2SP4XRrFd1JYnxeLeU8EqN3vDfZmbqBqaGJAyiLjTAwm6ZLRQUMv1ZACTj37sR62cfN7fe5JnJ7dh8zL4fiyLHV",
|
||||
"xprvA2JDeKCSNNZky6uBCviVfJSKyQ1mDYahRjijr5idH2WwLsEd4Hsb2Tyh8RfQMuPh7f7RtyzTtdrbdqqsunu5Mm3wDvUAKRHSC34sJ7in334",
|
||||
},
|
||||
{
|
||||
"test vector 1 chain m/0H/1/2H/2/1000000000",
|
||||
"000102030405060708090a0b0c0d0e0f",
|
||||
[]uint32{extkeys.HardenedKeyStart, 1, extkeys.HardenedKeyStart + 2, 2, 1000000000},
|
||||
[]uint32{HardenedKeyStart, 1, HardenedKeyStart + 2, 2, 1000000000},
|
||||
"xpub6H1LXWLaKsWFhvm6RVpEL9P4KfRZSW7abD2ttkWP3SSQvnyA8FSVqNTEcYFgJS2UaFcxupHiYkro49S8yGasTvXEYBVPamhGW6cFJodrTHy",
|
||||
"xprvA41z7zogVVwxVSgdKUHDy1SKmdb533PjDz7J6N6mV6uS3ze1ai8FHa8kmHScGpWmj4WggLyQjgPie1rFSruoUihUZREPSL39UNdE3BBDu76",
|
||||
},
|
||||
|
@ -80,28 +79,28 @@ func TestBIP32Vectors(t *testing.T) {
|
|||
{
|
||||
"test vector 2 chain m/0/2147483647H",
|
||||
"fffcf9f6f3f0edeae7e4e1dedbd8d5d2cfccc9c6c3c0bdbab7b4b1aeaba8a5a29f9c999693908d8a8784817e7b7875726f6c696663605d5a5754514e4b484542",
|
||||
[]uint32{0, extkeys.HardenedKeyStart + 2147483647},
|
||||
[]uint32{0, HardenedKeyStart + 2147483647},
|
||||
"xpub6ASAVgeehLbnwdqV6UKMHVzgqAG8Gr6riv3Fxxpj8ksbH9ebxaEyBLZ85ySDhKiLDBrQSARLq1uNRts8RuJiHjaDMBU4Zn9h8LZNnBC5y4a",
|
||||
"xprv9wSp6B7kry3Vj9m1zSnLvN3xH8RdsPP1Mh7fAaR7aRLcQMKTR2vidYEeEg2mUCTAwCd6vnxVrcjfy2kRgVsFawNzmjuHc2YmYRmagcEPdU9",
|
||||
},
|
||||
{
|
||||
"test vector 2 chain m/0/2147483647H/1",
|
||||
"fffcf9f6f3f0edeae7e4e1dedbd8d5d2cfccc9c6c3c0bdbab7b4b1aeaba8a5a29f9c999693908d8a8784817e7b7875726f6c696663605d5a5754514e4b484542",
|
||||
[]uint32{0, extkeys.HardenedKeyStart + 2147483647, 1},
|
||||
[]uint32{0, HardenedKeyStart + 2147483647, 1},
|
||||
"xpub6DF8uhdarytz3FWdA8TvFSvvAh8dP3283MY7p2V4SeE2wyWmG5mg5EwVvmdMVCQcoNJxGoWaU9DCWh89LojfZ537wTfunKau47EL2dhHKon",
|
||||
"xprv9zFnWC6h2cLgpmSA46vutJzBcfJ8yaJGg8cX1e5StJh45BBciYTRXSd25UEPVuesF9yog62tGAQtHjXajPPdbRCHuWS6T8XA2ECKADdw4Ef",
|
||||
},
|
||||
{
|
||||
"test vector 2 chain m/0/2147483647H/1/2147483646H",
|
||||
"fffcf9f6f3f0edeae7e4e1dedbd8d5d2cfccc9c6c3c0bdbab7b4b1aeaba8a5a29f9c999693908d8a8784817e7b7875726f6c696663605d5a5754514e4b484542",
|
||||
[]uint32{0, extkeys.HardenedKeyStart + 2147483647, 1, extkeys.HardenedKeyStart + 2147483646},
|
||||
[]uint32{0, HardenedKeyStart + 2147483647, 1, HardenedKeyStart + 2147483646},
|
||||
"xpub6ERApfZwUNrhLCkDtcHTcxd75RbzS1ed54G1LkBUHQVHQKqhMkhgbmJbZRkrgZw4koxb5JaHWkY4ALHY2grBGRjaDMzQLcgJvLJuZZvRcEL",
|
||||
"xprvA1RpRA33e1JQ7ifknakTFpgNXPmW2YvmhqLQYMmrj4xJXXWYpDPS3xz7iAxn8L39njGVyuoseXzU6rcxFLJ8HFsTjSyQbLYnMpCqE2VbFWc",
|
||||
},
|
||||
{
|
||||
"test vector 2 chain m/0/2147483647H/1/2147483646H/2",
|
||||
"fffcf9f6f3f0edeae7e4e1dedbd8d5d2cfccc9c6c3c0bdbab7b4b1aeaba8a5a29f9c999693908d8a8784817e7b7875726f6c696663605d5a5754514e4b484542",
|
||||
[]uint32{0, extkeys.HardenedKeyStart + 2147483647, 1, extkeys.HardenedKeyStart + 2147483646, 2},
|
||||
[]uint32{0, HardenedKeyStart + 2147483647, 1, HardenedKeyStart + 2147483646, 2},
|
||||
"xpub6FnCn6nSzZAw5Tw7cgR9bi15UV96gLZhjDstkXXxvCLsUXBGXPdSnLFbdpq8p9HmGsApME5hQTZ3emM2rnY5agb9rXpVGyy3bdW6EEgAtqt",
|
||||
"xprvA2nrNbFZABcdryreWet9Ea4LvTJcGsqrMzxHx98MMrotbir7yrKCEXw7nadnHM8Dq38EGfSh6dqA9QWTyefMLEcBYJUuekgW4BYPJcr9E7j",
|
||||
},
|
||||
|
@ -115,7 +114,7 @@ tests:
|
|||
continue
|
||||
}
|
||||
|
||||
extKey, err := extkeys.NewMaster(seed, []byte("Bitcoin seed"))
|
||||
extKey, err := NewMaster(seed, []byte("Bitcoin seed"))
|
||||
if err != nil {
|
||||
t.Errorf("NewMasterKey #%d (%s): %v", i, test.name, err)
|
||||
continue
|
||||
|
@ -354,7 +353,7 @@ func TestChildDerivation(t *testing.T) {
|
|||
|
||||
runTests := func(tests []testCase) {
|
||||
for i, test := range tests {
|
||||
extKey, err := extkeys.NewKeyFromString(test.master)
|
||||
extKey, err := NewKeyFromString(test.master)
|
||||
if err != nil {
|
||||
t.Errorf("NewKeyFromString #%d (%s): unexpected error creating extended key: %v", i, test.name, err)
|
||||
continue
|
||||
|
@ -381,29 +380,29 @@ func TestChildDerivation(t *testing.T) {
|
|||
|
||||
func TestErrors(t *testing.T) {
|
||||
// Should get an error when seed has too few bytes.
|
||||
_, err := extkeys.NewMaster(bytes.Repeat([]byte{0x00}, 15), []byte{0x00})
|
||||
if err != extkeys.ErrInvalidSeedLen {
|
||||
_, err := NewMaster(bytes.Repeat([]byte{0x00}, 15), []byte{0x00})
|
||||
if err != ErrInvalidSeedLen {
|
||||
t.Errorf("NewMaster: mismatched error -- got: %v, want: %v",
|
||||
err, extkeys.ErrInvalidSeedLen)
|
||||
err, ErrInvalidSeedLen)
|
||||
}
|
||||
|
||||
// Should get an error when seed has too many bytes.
|
||||
_, err = extkeys.NewMaster(bytes.Repeat([]byte{0x00}, 65), []byte{0x00})
|
||||
if err != extkeys.ErrInvalidSeedLen {
|
||||
_, err = NewMaster(bytes.Repeat([]byte{0x00}, 65), []byte{0x00})
|
||||
if err != ErrInvalidSeedLen {
|
||||
t.Errorf("NewMaster: mismatched error -- got: %v, want: %v",
|
||||
err, extkeys.ErrInvalidSeedLen)
|
||||
err, ErrInvalidSeedLen)
|
||||
}
|
||||
|
||||
// Generate a new key and neuter it to a public extended key.
|
||||
mnemonic := extkeys.NewMnemonic(extkeys.Salt)
|
||||
mnemonic := NewMnemonic(Salt)
|
||||
|
||||
phrase, err := mnemonic.MnemonicPhrase(128, extkeys.EnglishLanguage)
|
||||
phrase, err := mnemonic.MnemonicPhrase(128, EnglishLanguage)
|
||||
if err != nil {
|
||||
t.Errorf("Test failed: could not create seed: %s", err)
|
||||
}
|
||||
|
||||
password := "badpassword"
|
||||
extKey, err := extkeys.NewMaster(mnemonic.MnemonicSeed(phrase, password), []byte(extkeys.Salt))
|
||||
extKey, err := NewMaster(mnemonic.MnemonicSeed(phrase, password), []byte(Salt))
|
||||
if err != nil {
|
||||
t.Errorf("unexpected error: %v", err)
|
||||
return
|
||||
|
@ -416,20 +415,20 @@ func TestErrors(t *testing.T) {
|
|||
}
|
||||
|
||||
// Deriving a hardened child extended key should fail from a public key.
|
||||
_, err = pubKey.Child(extkeys.HardenedKeyStart)
|
||||
if err != extkeys.ErrDerivingHardenedFromPublic {
|
||||
t.Errorf("Child: mismatched error -- got: %v, want: %v", err, extkeys.ErrDerivingHardenedFromPublic)
|
||||
_, err = pubKey.Child(HardenedKeyStart)
|
||||
if err != ErrDerivingHardenedFromPublic {
|
||||
t.Errorf("Child: mismatched error -- got: %v, want: %v", err, ErrDerivingHardenedFromPublic)
|
||||
}
|
||||
|
||||
_, err = pubKey.BIP44Child(extkeys.CoinTypeETH, 0)
|
||||
if err != extkeys.ErrInvalidMasterKey {
|
||||
t.Errorf("BIP44Child: mistmatched error -- got: %v, want: %v", err, extkeys.ErrInvalidMasterKey)
|
||||
_, err = pubKey.BIP44Child(CoinTypeETH, 0)
|
||||
if err != ErrInvalidMasterKey {
|
||||
t.Errorf("BIP44Child: mistmatched error -- got: %v, want: %v", err, ErrInvalidMasterKey)
|
||||
}
|
||||
|
||||
childKey, _ := extKey.Child(extkeys.HardenedKeyStart + 1)
|
||||
_, err = childKey.BIP44Child(extkeys.CoinTypeETH, 0) // this should be called from master only
|
||||
if err != extkeys.ErrInvalidMasterKey {
|
||||
t.Errorf("BIP44Child: mistmatched error -- got: %v, want: %v", err, extkeys.ErrInvalidMasterKey)
|
||||
childKey, _ := extKey.Child(HardenedKeyStart + 1)
|
||||
_, err = childKey.BIP44Child(CoinTypeETH, 0) // this should be called from master only
|
||||
if err != ErrInvalidMasterKey {
|
||||
t.Errorf("BIP44Child: mistmatched error -- got: %v, want: %v", err, ErrInvalidMasterKey)
|
||||
}
|
||||
|
||||
// NewKeyFromString failure tests.
|
||||
|
@ -443,12 +442,12 @@ func TestErrors(t *testing.T) {
|
|||
{
|
||||
name: "invalid key length",
|
||||
key: "xpub1234",
|
||||
err: extkeys.ErrInvalidKeyLen,
|
||||
err: ErrInvalidKeyLen,
|
||||
},
|
||||
{
|
||||
name: "bad checksum",
|
||||
key: "xpub661MyMwAqRbcFtXgS5sYJABqqG9YLmC4Q1Rdap9gSE8NqtwybGhePY2gZ29ESFjqJoCu1Rupje8YtGqsefD265TMg7usUDFdp6W1EBygr15",
|
||||
err: extkeys.ErrBadChecksum,
|
||||
err: ErrBadChecksum,
|
||||
},
|
||||
{
|
||||
name: "pubkey not on curve",
|
||||
|
@ -465,7 +464,7 @@ func TestErrors(t *testing.T) {
|
|||
}
|
||||
|
||||
for i, test := range tests {
|
||||
extKey, err := extkeys.NewKeyFromString(test.key)
|
||||
extKey, err := NewKeyFromString(test.key)
|
||||
if !reflect.DeepEqual(err, test.err) {
|
||||
t.Errorf("NewKeyFromString #%d (%s): mismatched error -- got: %v, want: %v", i, test.name, err, test.err)
|
||||
continue
|
||||
|
@ -486,12 +485,12 @@ func TestBIP44ChildDerivation(t *testing.T) {
|
|||
derivedKey1String := "xprvA38t8tFW4vbuB7WJXEqMFmZqRrcZUKWqqMcGjjKjr2hbfvPhRtLLJGL4ayWG8shF1VkuUikVGodGshLiKRS7WrdsrGSVDQCY33qoPBxG2Kp"
|
||||
derivedKey2String := "xprvA38t8tFW4vbuDgBNpekPnuMSfpWziDLdF7W9Zd3mPy6eDEkM5F17vk59RtVoFbNdBBq84EJf5CqdZhhEoBkAM4DXHQsDqvUxVnncfnDQEFg"
|
||||
|
||||
extKey, err := extkeys.NewKeyFromString(keyString)
|
||||
extKey, err := NewKeyFromString(keyString)
|
||||
if err != nil {
|
||||
t.Error("NewKeyFromString: cannot create extended key")
|
||||
}
|
||||
|
||||
accounKey1, err := extKey.BIP44Child(extkeys.CoinTypeETH, 0)
|
||||
accounKey1, err := extKey.BIP44Child(CoinTypeETH, 0)
|
||||
if err != nil {
|
||||
t.Error("Error dering BIP44-compliant key")
|
||||
}
|
||||
|
@ -500,7 +499,7 @@ func TestBIP44ChildDerivation(t *testing.T) {
|
|||
}
|
||||
t.Logf("Account 1 key: %s", accounKey1.String())
|
||||
|
||||
accounKey2, err := extKey.BIP44Child(extkeys.CoinTypeETH, 1)
|
||||
accounKey2, err := extKey.BIP44Child(CoinTypeETH, 1)
|
||||
if err != nil {
|
||||
t.Error("Error dering BIP44-compliant key")
|
||||
}
|
||||
|
|
|
@ -1,12 +1,10 @@
|
|||
package extkeys_test
|
||||
package extkeys
|
||||
|
||||
import (
|
||||
"encoding/json"
|
||||
"fmt"
|
||||
"os"
|
||||
"testing"
|
||||
|
||||
"github.com/status-im/status-go/extkeys"
|
||||
)
|
||||
|
||||
type VectorsFile struct {
|
||||
|
@ -21,13 +19,13 @@ type Vector struct {
|
|||
// TestMnemonicPhrase
|
||||
func TestMnemonicPhrase(t *testing.T) {
|
||||
|
||||
mnemonic := extkeys.NewMnemonic(extkeys.Salt)
|
||||
mnemonic := NewMnemonic(Salt)
|
||||
|
||||
// test strength validation
|
||||
strengths := []int{127, 129, 257}
|
||||
for _, s := range strengths {
|
||||
_, err := mnemonic.MnemonicPhrase(s, extkeys.EnglishLanguage)
|
||||
if err != extkeys.ErrInvalidEntropyStrength {
|
||||
_, err := mnemonic.MnemonicPhrase(s, EnglishLanguage)
|
||||
if err != ErrInvalidEntropyStrength {
|
||||
t.Errorf("Entropy strength `%d` should be invalid", s)
|
||||
}
|
||||
}
|
||||
|
@ -36,7 +34,7 @@ func TestMnemonicPhrase(t *testing.T) {
|
|||
t.Log("Test mnemonic generation:")
|
||||
for _, language := range mnemonic.AvailableLanguages() {
|
||||
phrase, err := mnemonic.MnemonicPhrase(128, language)
|
||||
t.Logf("Mnemonic (%s): %s", extkeys.Languages[language], phrase)
|
||||
t.Logf("Mnemonic (%s): %s", Languages[language], phrase)
|
||||
|
||||
if err != nil {
|
||||
t.Errorf("Test failed: could not create seed: %s", err)
|
||||
|
@ -57,7 +55,7 @@ func TestMnemonicPhrase(t *testing.T) {
|
|||
stats := map[string]int{}
|
||||
for _, vector := range vectorsFile.vectors {
|
||||
stats[vector.language] += 1
|
||||
mnemonic := extkeys.NewMnemonic(vector.salt)
|
||||
mnemonic := NewMnemonic(vector.salt)
|
||||
seed := mnemonic.MnemonicSeed(vector.mnemonic, vector.password)
|
||||
if fmt.Sprintf("%x", seed) != vector.seed {
|
||||
t.Errorf("Test failed (%s): incorrect seed (%x) generated (expected: %s)", vector.language, seed, vector.seed)
|
||||
|
|
Loading…
Reference in New Issue